Thank you for caring about the security of etcdmonitor. This document describes how to report vulnerabilities and what to expect in response.
Only the latest minor release receives security fixes. Older releases are considered end-of-life and will not be patched.
| Version | Supported |
|---|---|
| latest | ✅ |
| older | ❌ |
Do not open a public GitHub issue for security vulnerabilities.
Use one of the following private channels:
- GitHub Private Security Advisories (preferred): Report a vulnerability
- Email:
security@example.com(maintainers: replace with a real address before publishing this document)
When reporting, please include:
- A clear description of the issue and potential impact
- Steps to reproduce (minimal test case preferred)
- etcdmonitor version, etcd version, OS / kernel
- Any proof-of-concept code or exploit (encrypted if sensitive)
If you wish to encrypt your report, request our PGP key in your first message.
- Acknowledgement: within 3 business days
- Triage & severity assessment: within 7 business days
- Fix or mitigation: within 30 days for High/Critical, best effort for Medium/Low
We will keep you informed of progress and coordinate public disclosure.
- Reporter contacts the maintainers privately.
- Maintainers confirm the vulnerability and develop a fix.
- A coordinated disclosure date is agreed.
- Fix is released; advisory is published with credit to the reporter (unless anonymity is requested).
- CVE is requested when applicable.
Commits prior to the security-audit-hardening release shipped an example
certs/server.key / certs/server.crt pair (self-signed, CN=etcdmonitor).
This key is revoked and MUST NOT be used. All deployments must run
./tools/gen-certs.sh on the target machine to generate a local keypair. The
build (install.sh) refuses to start when tls_enable: true and the key files
are absent.
Git history has not been rewritten (to preserve stable history for forks and
stargazers). Since the keypair is self-signed with no CA trust, the only
realistic attack surface is operators who blindly deploy example files. That
path is now blocked by install.sh behavior and by this advisory.
This policy covers:
- The
etcdmonitorbinary and its modules underinternal/,cmd/ - The web dashboard in
web/(includingweb/vendor/*bundled assets) - Installation scripts (
install.sh,uninstall.sh,tools/*) - Deployment configuration (
config.yamlsemantics)
Out of scope:
- Vulnerabilities in unrelated 3rd-party software even if used alongside etcdmonitor (please report those upstream)
- Social engineering, physical access, or denial-of-service via resource exhaustion beyond documented limits
- Misconfiguration by the deploying operator (e.g. running as root without
following the
--run-user etcdmonitorrecommendation inSECURITY_CHECKLIST.md)
We will not take legal action against researchers who:
- Make a good-faith effort to avoid privacy violations and service disruption
- Report vulnerabilities privately per this policy
- Do not exploit or access more data than necessary to demonstrate the issue
Thank you for helping keep etcdmonitor and its users safe.